RemoveThreat
Static task
static1
Behavioral task
behavioral1
Sample
7667c8105304d870a243e3fdc2b8d147_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7667c8105304d870a243e3fdc2b8d147_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
7667c8105304d870a243e3fdc2b8d147_JaffaCakes118
-
Size
295KB
-
MD5
7667c8105304d870a243e3fdc2b8d147
-
SHA1
3ec955fc73a412b4d1e1477914891808c2bf6e5a
-
SHA256
4a5cee0df8745e59b911c37979f4a7fd437139fd7891125b8b3fce996b7074a1
-
SHA512
01dbe17a0fe48dfc6c961352a73004126f37af6055824104f91cac1dc5ed2b08d014d4d229fe56159176b024ce398006b3686bf9d71ec0c5372c09ca63431505
-
SSDEEP
6144:XFX9vRYhUDQo4I25ZVc856pOxRMz3gfYbUeEiXMZL:XFX9vsbh56pOxqzjbmi6L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7667c8105304d870a243e3fdc2b8d147_JaffaCakes118
Files
-
7667c8105304d870a243e3fdc2b8d147_JaffaCakes118.dll windows:5 windows x86 arch:x86
be884aa10e079ed4d4aa7b27a1237ff2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpyA
CopyFileA
FindClose
FindNextFileA
CloseHandle
UnmapViewOfFile
OutputDebugStringA
lstrcatA
CreateFileMappingA
GetFileSize
ReadFile
CreateFileA
FindFirstFileA
IsBadReadPtr
WideCharToMultiByte
GetSystemDirectoryA
VirtualQuery
MapViewOfFile
VirtualProtect
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
GetCurrentThreadId
GetCommandLineA
GetLastError
HeapFree
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapAlloc
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
advapi32
RegSetValueExA
RegOpenKeyA
RegCreateKeyA
oleaut32
SysFreeString
SysAllocString
shlwapi
StrStrIA
PathAddBackslashA
PathAppendA
imagehlp
UnMapAndLoad
Exports
Exports
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 185KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ